Showing 21 - 40 results of 341 for search '"Phish"', query time: 0.09s Refine Results
  1. 21

    Contemporary musicians. Volume 25 : profiles of the people in music

    Detroit, Mich. : Gale Group, 1999
    Table of Contents: “…Geils Band -- Alan Jackson -- Jewel -- Kiss -- Mark Knopfler -- kd Lang -- Nils Lofgren -- Nick Lowe -- Little Willie John -- Martha and the Vandellas -- Pietro Mascagni -- Tommy McClennan -- Clyde McPhatter -- Memphis Jug Band -- Memphis Minnie -- Natalie Merchant -- Morcheeba -- Fats Navarro -- 'N Sync -- Stevie Nicks -- Danilo Perez -- Phish -- The Platters -- Lloyd Price -- Giacomo Puccini -- Puff Daddy -- Rammstein -- Maurice Ravel -- Joshua Redman -- R.E.M. -- Chris Rice -- Run DMC -- Pee Wee Russell -- Camille Saint-Saens -- Erik Satie -- Peggy Seeger -- Bruce Springsteen -- Richard Strauss -- Supertramp -- Tampa Red -- James Taylor --- Third Eye Blind -- Pam Tillis -- Chucho Valdes -- Van Halen -- Robbie Williams -- Trisha Yearwood.…”
    Format: Electronic eBook
    Access E-Book
  2. 22

    Contemporary musicians. Volume 13 : profiles of the people in music

    Detroit, Mich. : Gale Research, 1995
    Table of Contents: “…Adam Ant -- Mildred Bailey -- Chet Baker -- Afrika Bambaataa -- Joanie Bartels -- The Bellamy Brothers -- Terence Blanchard -- Pat Boone -- Big Bill Broonzy -- Ruth Brown -- Grace Bumbry -- T Bone Burnett -- Tevin Campbell -- The Carpenters -- Peter Case -- The Charlatans -- Mark Chesnutt -- Van Cliburn -- Curve -- Dick Dale -- Iris DeMent -- Devo -- Eazy-E -- Einsturzende Neubauten -- David Foster -- Fugazi -- Gang Starr -- Gwar -- Roland Hayes -- Tish Hinojosa -- Lightnin' Hopkins -- Jodeci -- Jerome Kern -- Nusrat Fateh Ali Khan -- Kool and the Gang -- Leo Kottke -- Gene Krupa -- Lerner and Loewe -- Steve Lillywhite -- Joe Lovano -- Lush -- Ellis Marsalis -- The Meat Puppets -- Johnny Mercer -- Charlie Musselwhite -- The O'Jays -- Pantera -- Phish -- The Proclaimers -- Della Reese -- Trent Reznor -- Sylvia Rhone -- Buddy Rich -- Nino Rota -- Sawyer Brown -- Gil Scott-Heron -- Jon Secada -- Paul Shaffer -- Shonen Knife -- Sly and Robbie --- Smashing Pumpkins -- Georg Solti -- Sounds of Blackness -- Mavis Staples -- The Story -- Billy Strayhorn -- Al B. …”
    Format: Electronic eBook
    Access E-Book
  3. 23

    Fundamentals of information systems by Stair, Ralph M.

    Boston : Thomson/Course Technology, 2006
    Third edition.
    Table of Contents: “…Ethical and Societal Issues: Phishing for Visa Card Customers --…”
    Format: Book


  4. 24

    PhanFood : from the kitchen pot to the tour lot

    [Albany, N.Y.] : Excelsior Editions/State University of New York Press, 2010
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  5. 25

    PhanFood from the kitchen pot to the tour lot

    [Albany, N.Y.] : Excelsior Editions/State University of New York Press, 2010
    Format: Electronic eBook
    Access E-Book
  6. 26

    Between Me and My Mind.

    [San Francisco, California, USA] : Gravitas Ventures,; Kanopy Streaming, 2019; 2022
    Format: Electronic Video
    Streaming video (Wentworth users only)
  7. 27
  8. 28

    Sc@mmed : online identity theft

    New York, N.Y. : Films Media Group, 2007
    Table of Contents: “…Identity Theft Can Strike Anyone (1:55) -- Identity Theft Through Phishing (3:47) -- High Profits from Credit Card Theft (2:44) -- Tracking an Online Identity Thief (2:24) -- Challenges to Locating Cybercrooks (3:18) -- A Victim of Phishing and Online Credit Card Theft (3:50) -- How Online Identity Thieves Operate (1:47) -- Canadian Detectives Fight Cyber Crime (2:32) -- Responsibility for Protecting Identities (1:58)…”
    Format: Electronic Video
    Streaming video (Emerson users only)
  9. 29

    Sc@mmed online identity theft

    New York, N.Y. : Films Media Group, 2007
    Table of Contents: “…Identity Theft Can Strike Anyone (1:55) -- Identity Theft Through Phishing (3:47) -- High Profits from Credit Card Theft (2:44) -- Tracking an Online Identity Thief (2:24) -- Challenges to Locating Cybercrooks (3:18) -- A Victim of Phishing and Online Credit Card Theft (3:50) -- How Online Identity Thieves Operate (1:47) -- Canadian Detectives Fight Cyber Crime (2:32) -- Responsibility for Protecting Identities (1:58)…”
    Format: Electronic Video
    Streaming video (Emerson users only)
    Streaming video (Wentworth users only)
  10. 30

    Computer Security : QuickStudy Reference Guide.

    Boca Raton : BarCharts, Inc., 2014
    Table of Contents: “…Introduction; Using This Guide; Related Terminology; Threats; Malware; Related Terminology: Malware; Malware: Types; Malware: Website Infection; Social Engineering; Impersonation; Shoulder Surfing; Spam; Phishing; Characteristics of Phishing Scams; Examples of Phishing Scams; Prevention & Protection; Security Plan; Security Responsibilities; Security vs. …”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  11. 31

    Proceedings of the 5th Brazilian Technology Symposium Emerging Trends, Issues, and Challenges in the Brazilian Technology, Volume 2

    Cham : Springer International Publishing : Imprint: Springer, 2021
    1st ed. 2021.
    Table of Contents: “…Resilient and Robust Control -- Vehicle Systems -- Smart System Architectures -- Smart Electricity -- Phishing Analytic and System Security -- Resource Management.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  12. 32

    Information Security Education - Challenges in the Digital Age 16th IFIP WG 11.8 World Conference on Information Security Education, WISE 2024, Edinburgh, UK, June 12–14, 2024, Pro...

    Cham : Springer Nature Switzerland : Imprint: Springer, 2024
    1st ed. 2024.
    Table of Contents: “…. -- Using Visual Cues to Enhance Phishing Education for Children. -- Lessons Learnt from Using Educational Phishing Materials with UK Primary School Children. -- A framework for integrating gamification in information security awareness programmes for higher education students. -- Using Breach and Attack Demonstrations to Explain Spear Phishing Attacks to Young Adults. -- Enhancing Awareness. -- Empirical evidence of fake news awareness levels among students. -- An In-Depth Analysis of Security and Privacy Concerns in Smart Home IoT Devices Through Expert User Interviews. -- Safeguarding Children’s Digital Privacy: Exploring Design Requirements for Effective Literacy Training for Parents. -- Digital Forensics and Investigation. -- Digital Detectives: A Serious Point-and-Click Game for Digital Forensics. -- Developing Digital Forensics Expertise Competencies Through Courtroom Role-Play. -- Cybersecurity Programs and Career Development. -- Assessing the cross-disciplinary accessibility of CyBOK. -- A Study on Exploring the Challenges of the CyberCorps®: Scholarship for Service Program to Support PhD Level Scholarships. -- The Potential of Generative AI Chatbots as Career Advisors in Cybersecurity: Professionals’ Perspectives.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  13. 33

    Model-driven Simulation and Training Environments for Cybersecurity Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers

    Cham : Springer International Publishing : Imprint: Springer, 2020
    1st ed. 2020.
    Table of Contents: “…Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems -- Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models -- A Pond Full of Phishing Games – Analysis of Learning Games for Anti-Phishing Education -- Conceptualization of a CyberSecurity Awareness Quiz -- Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges -- Automatically protecting network communities by malware epidemiology -- Chasing Botnets: A Real Security Incident Investigation -- Software System Exploration using Library Call Analysis -- A pattern–driven adaptation in IoT orchestrations to guarantee SPDI properties -- Password Management: How Secure Is Your Login Process?.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  14. 34

    Deconstruction machines : writing in the age of cyberwar by Joque, Justin, 1984-

    Minneapolis, MN : University of Minnesota Press, 2018
    Table of Contents: “…Root kit -- Buffer overflow: the space and time of cyberwar -- Injection attack: writing and the information catastrophe -- Distributed denial of service: cybernetic sovereignty -- Spear phishing: nodal subjects -- Firmware vulnerabilities.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Access E-Book
    Full text (Wentworth users only)
  15. 35

    JavaScript security : learn JavaScript security to make your web applications more secure by Liang, Y. E.

    Birmingham [England] : Packt Publishing, 2014
    Table of Contents: “…Chapter 6: JavaScript PhishingWhat is JavaScript phishing?; Examples of JavaScript phishing; Classic examples; Accessing user history by accessing local state; XSS and CSRF; Intercepting events; Defending against JavaScript phishing; Upgrading to latest versions of web browsers; Recognizing real web pages; Protecting your site against XSS and CSRF; Avoid using pop ups and keep your address bars; Summary; Index…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  16. 36

    The revolution will not be televised : democracy, the Internet, and the overthrow of everything by Trippi, Joe

    New York : HarperPaperbacks, 2008
    Rev. ed.
    Table of Contents: “…The moment : killer apps, open source, and the guy -- 5. Vermont : phish, chicken dinners, and the Deanie Babies -- 6. …”
    Format: Book


  17. 37

    Biography. Ben & Jerry

    New York, NY : A&E Television Networks, 2005
    Format: Electronic Video
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  18. 38

    Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings

    Cham : Springer International Publishing : Imprint: Springer, 2015
    Table of Contents: “…Realism in Teaching Cyber security Research: The Agile Research Process -- Assurance Cases as a Didactic Tool for Information Security -- Cognitive Task Analysis Based Training for Cyber Situation Awareness -- A Cyber Security Multi Agency Collaboration for Rapid Response that Uses AGILE Methods on an Education Infrastructure -- Cyber security Through Secure Software Development -- Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses -- The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach -- Learn to Spot Phishing URLs with the Android No Phish App -- An Innovative Approach in Digital Forensic Education and Training -- On Experience of Using Distance Learning Technologies for Teaching Cryptology -- Reflections on the Ethical Content of the IT Honours Program Project Module -- Professional Competencies Level Assessment for Training of Masters in Information Security -- History of Cryptography in Syllabus on Information Security Training.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  19. 39

    Does the Internet increase crime?

    Detroit : Greenhaven Press, 2010
    Table of Contents: “…Sex offenders prey on teenagers online / Bruce Bower -- The danger of Internet predators has been exaggerated / Larry Magid -- Online sexual abuse is a serious problem / Michael Scherer -- Sex offenders should not be banned from using the Internet / Declan McCullagh -- The Internet might reduce violence against women / Steve Chapman -- Online gambling leads to crime / Spencer Bachus -- Online poker is not a crime / Chris "Fox" Wallace -- Teen "sexting" is a crime / Missy Diaz -- "Phishing" can fool even experts / Tom Regan -- E-mail reform is necessary to prevent "phishing" / PR Newswire -- Cyberbullying is a menace to educators / Mary Bousted -- Cyberbullying should not be dealt with in courts / Emily Bazelon -- Developing countries pose a safety risk to western Internet users / Richard Bowman -- The economic downturn increases Internet crime / Karin Brulliard -- YouTube boosts rogue Internet pharmacies / Kristina Peterson ... …”
    Format: Book


  20. 40

    Cyber Security: The Lifeline of Information and Communication Technology by Prasad, Ramjee, Rohokale, Vandana

    Cham : Springer International Publishing : Imprint: Springer, 2020
    1st ed. 2020.
    Table of Contents: “…Introduction -- Cyber Threats and Attack Overview -- Phishing -- BOTNETS -- Copyright Infringement -- Cyber Forensics -- Trust Management -- Internet of Things (IoT) and Machine to Machine (M2M) Communication -- Smart Grid -- Cloud Computing -- Smart Devices -- E-Commerce -- Social Networking Sites -- Secure Incident Handling -- Exploiting Artificial Intelligence for Cyber Security -- Research Challenges and Future Scope.…”
    Format: Electronic eBook
    Full text (Wentworth users only)